• XSS.stack #1 – первый литературный журнал от юзеров форума

Cobalt Strike 4.7 "Free" With Dark Mode...

Is this tool useful to you?


  • Другие смогут видеть, как Вы проголосовали.
Пожалуйста, обратите внимание, что пользователь заблокирован
Пожалуйста, обратите внимание, что пользователь заблокирован
I see a lot of people charging money for this tool!
So decides to share it with you for free


If you find this tool useful, please help me with an updated RunPE method

I'm having problems with what I'm using right now!
I understand C++, C# well so we can exchange ideas...



Посмотреть вложение 44172
C2 Customization is very cool! you can try put this techniques:
UAC Bypass;
Use hard math operations (with bitwise too);
PPID Parent Spoofing (Privesc, Anti-debugging and more);
INT 3 and TRAP FLAG (Anti debugging);
Built-in debugger for User-Mode Hooks detection and unhooking (isn't that difficult);
Built-in stealer (Now days are impossible to touch LSASS with a good EDR/XDR config);
Use advanced ciphers in c2 config (Cylance, Sophos and more has now snort rules to decrypt c2 agents);
You won't need to implement all of this, and if u have questions u can send me messages in my telegram.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
C2 Customization is very cool! you can try put this techniques:
UAC Bypass;
Use hard math operations (with bitwise too);
PPID Parent Spoofing (Privesc, Anti-debugging and more);
INT 3 and TRAP FLAG (Anti debugging);
Built-in debugger for User-Mode Hooks detection and unhooking (isn't that difficult);
Built-in stealer (Now days are impossible to touch LSASS with a good EDR/XDR config);
Use advanced ciphers in c2 config (Cylance, Sophos and more has now snort rules to decrypt c2 agents);
You won't need to implement all of this, and if u have questions u can send me messages in my telegram.
Thanks bro, I'll write everything down and try to implement it in code!
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх